Research Article

A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications

Figure 8

Performance comparison: (a) MSE, (b) PSNR, (c) SSIM, (d) MAE, (e) RMSE, (f) PIQE, (g) BRISQE, and (h) CC based on distortion.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)